2.13. Answers to Review Questions
A. A DoS attack is intended to prevent access to network resources by overwhelming or flooding a service or network.
B. A DDoS attack uses multiple computer systems to attack a server or host in the network.
C. In a back door attack, a program or service is placed on a server to bypass normal security procedures.
A. A man-in-the-middle attack attempts to fool both ends of a communications session into believing the system in the middle is the other end.
C. A replay attack attempts to replay the results of a previously successful session to gain access.
D. TCP/IP hijacking is an attempt to steal a valid IP address and use it to gain authorization or information from a network.
A. A TCP ACK attack creates multiple incomplete ...
Get CompTIA Security+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.